Data retention 'under active consideration': Brandis

Attorney-General George Brandis has confirmed that the government is still mulling introducing mandatory data retention for telcos, but it will not be included in the first tranche of national security-related legislation being introduced in parliament today.

Data retention is "under active consideration by the government," Brandis told a press conference this afternoon.

"I might point out to you that as recently as yesterday the House of Commons [in the UK] passed a new data retention statute," the attorney-general said.

"This is very much the way Western nations are going. It's been the case in Europe under the European Data Retention Directive for some little while now."

"As there is increasing sophistication in communications, almost every ASIO investigation and a very large number of law enforcement investigations depend at least in the first instance on access to retained data," Irvine said.

"Data that's telecommunications data , call data that's been retained by the telephone companies . We don't collect it and retain it ourselves."

Brandis announced in June that the government would seek to boost the powers available to intelligence agencies, based on a report issued last year by the Parliamentary Joint Committee on Intelligence and Security. Those recommendations include updating the ASIO Act to modernise certain definitions and allow access to third party computer systems to retrieve information.

The next tranche of national security legislation will be introduced in the spring settings of parliament, Brandis said.

Top Whitepapers

Cloud, big data and analytics, mobile, social, and IT security have impacted networking – bringing it almost to breaking point. This whitepaper looks at the future of networking to accommodate these evolving trends.

Zones

Featured Whitepapers

Identity and Access Governance is often used in reaction to demands from auditors. However, thinking of governance as only a means to pass audit is short-sighted. Failure to proactively manage user access to sensitive resources puts you at risk for sabotage, fraud, data breaches and financial penalties. In this whitepaper you'll learn: if your governance program is proactive or reactive, what to look for when searching for a solution to help you reduce risk.

Copyright 2015 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.